US20040190446A1 - Transport network restoration method - Google Patents

Transport network restoration method Download PDF

Info

Publication number
US20040190446A1
US20040190446A1 US10/787,358 US78735804A US2004190446A1 US 20040190446 A1 US20040190446 A1 US 20040190446A1 US 78735804 A US78735804 A US 78735804A US 2004190446 A1 US2004190446 A1 US 2004190446A1
Authority
US
United States
Prior art keywords
path
network
network element
restoration
output port
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US10/787,358
Other versions
US7590131B2 (en
Inventor
Stefan Ansorge
Martin Huck
Dieter Beller
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Corp
Nokia USA Inc
Original Assignee
Alcatel SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Assigned to ALCATEL reassignment ALCATEL ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ANSORGE, STEFAN, BELLER, DIETER, HUCK, MARTIN
Application filed by Alcatel SA filed Critical Alcatel SA
Publication of US20040190446A1 publication Critical patent/US20040190446A1/en
Application granted granted Critical
Publication of US7590131B2 publication Critical patent/US7590131B2/en
Assigned to CREDIT SUISSE AG reassignment CREDIT SUISSE AG SECURITY AGREEMENT Assignors: ALCATEL LUCENT
Assigned to ALCATEL LUCENT reassignment ALCATEL LUCENT RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CREDIT SUISSE AG
Assigned to CORTLAND CAPITAL MARKET SERVICES, LLC reassignment CORTLAND CAPITAL MARKET SERVICES, LLC SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP HOLDINGS, LLC, PROVENANCE ASSET GROUP, LLC
Assigned to PROVENANCE ASSET GROUP LLC reassignment PROVENANCE ASSET GROUP LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL LUCENT SAS, NOKIA SOLUTIONS AND NETWORKS BV, NOKIA TECHNOLOGIES OY
Assigned to NOKIA USA INC. reassignment NOKIA USA INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP HOLDINGS, LLC, PROVENANCE ASSET GROUP LLC
Assigned to NOKIA US HOLDINGS INC. reassignment NOKIA US HOLDINGS INC. ASSIGNMENT AND ASSUMPTION AGREEMENT Assignors: NOKIA USA INC.
Assigned to ALCATEL LUCENT reassignment ALCATEL LUCENT CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: ALCATEL
Assigned to PROVENANCE ASSET GROUP HOLDINGS LLC, PROVENANCE ASSET GROUP LLC reassignment PROVENANCE ASSET GROUP HOLDINGS LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA US HOLDINGS INC.
Assigned to PROVENANCE ASSET GROUP HOLDINGS LLC, PROVENANCE ASSET GROUP LLC reassignment PROVENANCE ASSET GROUP HOLDINGS LLC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: CORTLAND CAPITAL MARKETS SERVICES LLC
Assigned to RPX CORPORATION reassignment RPX CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PROVENANCE ASSET GROUP LLC
Assigned to BARINGS FINANCE LLC, AS COLLATERAL AGENT reassignment BARINGS FINANCE LLC, AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: RPX CORPORATION
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/02Details
    • H04J3/08Intermediate station arrangements, e.g. for branching, for tapping-off
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0073Provisions for forwarding or routing, e.g. lookup tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0077Labelling aspects, e.g. multiprotocol label switching [MPLS], G-MPLS, MPAS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0079Operation or maintenance aspects
    • H04Q2011/0081Fault tolerance; Redundancy; Recovery; Reconfigurability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0079Operation or maintenance aspects
    • H04Q2011/0083Testing; Monitoring

Definitions

  • the present invention relates to the field of telecommunications and more particularly to a path restoration method in a transport network and a network element with fast restoration capabilities.
  • Transport networks serve for the physical layer transport of high bitrate tributary signals.
  • the signals transmitted over a transport network are encoded and multiplexed into a continuous bit stream structured into frames of the same length.
  • the frames are repeated periodically with a frame repetition rate of typically 8 kHz and are structured according to a multiplexing hierarchy.
  • the frames have a section overhead and contain at least one higher order multiplexing unit called virtual container VC- 4 .
  • a VC- 4 can either directly carry a tributary signal or a number of lower order multiplexing units like VC- 12 or VC- 3 , which then carry tributary signals.
  • Virtual containers are transmitted from source to sink through an SDH network and therefore represent a “logical” path through the network.
  • the sequence of identical VCs having the some relative position in subsequent frames forms a traffic stream along that path.
  • Each VC contains a path overhead (POH) and a payload section referred to as container (C).
  • POH path overhead
  • C payload section
  • SONET Synchronous Optical Network
  • Another well known transport network with similar multiplexing units is the recently defined Optical Transport Network OTN; see ITU-T G.709, 02/2001.
  • a very basic aspect in all types of transport networks is availability and reliability of service.
  • a transport network must be very robust against any kind of failure and the average outage time must be very low.
  • a transport network needs to provide the means and facilities to ensure sufficient availability.
  • network mechanisms which ensure this availability are distinguished in protection and restoration. The common principle of both is to redirect traffic of a failed physical link or logical path over a spare resource.
  • Protection is a mechanisms where an already established protection path or link is assigned to one selected high-priority path or link (known as 1+1 or 1:1 protection, depending on whether there is low priority extra traffic on the protection resource or not) or a group of n such selected paths or links (known as 1:n protection).
  • traffic can be re-routed very fast over the previously established protection resource under the sole control of the affected network elements in typically less than 50 ms.
  • Protection is a high-quality service restricted to few selected premium connections, which are typically charged at a higher price.
  • protection requires a high amount of spare resources compared with the amount of protected resources, i.e., 100% of spare capacity in the case of 1+1 protection.
  • Restoration refers to a mechanism, where the network searches for restoration capacity and establishes a restoration path only after service path failure. Rather than calculating the restoration path after failure, pre-calculated restoration routes can be used instead but with the actual cross-connection to establish the path performed after failure. Restoration mechanisms are more stringent in the usage of spare capacity and however, providing a masking of the failure at a lower speed, typically in the range of a few seconds as completely new paths through the network must be established.
  • LSPs label switched paths
  • MPLS Multi-Protocol Label Switching
  • MPLS Multi-Protocol Label Switching
  • transport networks if a path is established, then by definition the full bandwidth requested by the path is consumed, independent of whether traffic is transmitted over this path or not.
  • An LSP can be established before failure in MPLS, but not used until after failure, whereas this is not possible in transport networks.
  • each path is identified at least locally with an identifier called herein a path tag which is part of the multiplex units that represent the corresponding path and forwarding information is provided in each network element.
  • the source network element cross-connects the affected traffic stream to an alternate output port.
  • a network element receives a new traffic stream at an input port, it checks the received path tag and determines an appropriate output port based on the tag and the forwarding information and establishes an internal cross-connection between the input port and corresponding output port.
  • the forwarding information is provided by the management plane of the transport network and represents pre-calculated restoration paths.
  • the established restoration path consumes spare resources in the network, which are therefore no longer available for restoration purpose in the case of further failures. Therefore, in an advantageous improvement, the management plane is informed of the established restoration path after activation of the restoration path in the event of a failure, and determines new forwarding information to allow masking of potential further failures in the network over newly pre-calculated restoration paths.
  • the invention has the advantage that the average restoration time in the network can be reduced to about 50 ms or even less, depending on the repetition rate of the tag and the number of involved network elements along the restoration path.
  • FIG. 1 shows an example network topology
  • FIG. 2 shows the control and management of a network element
  • FIG. 3 shows the restoration principle at a network element in a first embodiment
  • FIG. 4 shows how the path is established through a network element and what when path setup fails.
  • transmission signal for a multiplex signal subdivided into frames of the same length.
  • the frames are structured according to a multiplex hierarchy into multiplex units such as virtual containers VC in SDH.
  • a certain multiplex unit represents a path through the network and repeats every frame.
  • the sequence of identical multiplex units that are transmitted along the same path form a traffic stream which transports a tributary signal.
  • traffic streams are thus multiplexed according to the multiplex hierarchy to form the transmission signal.
  • FIG. 1 An example network topology is shown in FIG. 1.
  • a first working path WP 1 exists between network elements NE 1 and NE 2 and a second working path WP 2 exists between network elements NE 3 and NE 4 .
  • Broken lines PP 1 a, PP 1 c, PP 2 a, PP 2 c, and SPP indicate reserved restoration capacity allowing network restoration in the case of a failure of either of the working paths. If for example path WP 1 fails, a restoration path (also termed backup path) is created via network elements NE 5 and NE 6 using restoration capacity PP 1 a, SPP, and PP 1 c.
  • path WP 2 fails, a restoration path is created using restoration capacity PP 2 a, SPP, and PP 2 c. It is important to understand, that these restoration paths, even if they may be pre-calculated, are only established after occurrence of a failure. In other words, the network elements NE 5 and NE 6 switch a corresponding internal crossconnection to establish the restoration path only after a failure has occurred. This allows to share a single entity of restoration capacity SPP between NE 5 and NE 6 for both working paths WP 1 and WP 2 .
  • the hardware design and control of a network element is shown schematically in FIG. 2.
  • the network element itself consists of a number of hardware modules, such as input/output boards I/O and crossconnect matrix boards X shown in the embodiment by way of example. Interconnections and signal flow of transmission signals are not shown in the figure.
  • the individual boards are controlled and configured by a low level hardware controller, which is called second level controller SLC.
  • the second level controller can be distributed among the boards, can consist of some few shelf controllers, or can also be a single controller if the network element is installed in only one shelf. It contains the hardware oriented control software which is termed firmware.
  • the second level controller is controlled by a higher level controller called the first level controller FLC.
  • This first level controller contains for the purpose of network management an abstraction of the network element and its resources in the form of a management information base (MIB).
  • the MIB contains managed objects respectively representing the physical and logical resources of the entire network element and their configuration.
  • a virtual hardware module and a firmware adaptor interface the MIB in the first level controller towards the firmware in the second level controller.
  • the first level controller FLC is controlled by a network management or management plane TMN, which may be a central network management system for the entire network.
  • the interface between the central network management system and the network elements is known as the Q-interface for which a standardized protocol exists.
  • the management plane may be a distributed network management system where each network element is controlled by an individual element controller and where these element controllers communicate with each other using the recently defined GMPLS protocol to find a route through the network and establish network paths.
  • Communication within the management plane and towards the network elements uses a dedicated packet switched control network apart from the transport network. However, some interconnections in this dedicated control network may use the so-called data communication channels in the section overhead of transmission signals in the transport network.
  • the management plane TMN is responsible to properly configure the entire network. If for example a new connection is to be established in the network, the management plane instructs the first level controllers of the affected network elements to switch the new connection. The first level controllers reconfigure their abstract view of the corresponding network elements accordingly and update their persistent configuration data. Then the request is forwarded to the second level controller, which determines the actual hardware modules involved and reconfigures these to establish the connection as requested.
  • the second level controller monitors the hardware modules for any alarm and failure conditions and reports these to the first level controller.
  • the first level controller maps alarm and failure reports on the abstraction and reports any irregularities to the management plane.
  • the management plane needs to localize a failure by correlating received alarm reports and requests the affected network elements to switch new crossconnections to establish a dynamically calculated or pre-calculated restoration path.
  • this process requires extended time-consuming communication and processing, which sums up to a considerably high restoration time.
  • FIG. 3 shows a network element NE with a first input port I 1 and first output port O 1 and a second input port I 2 and a second output port O 2 . It has to be noted that these two input and output ports are shown only be way of example but that the network element has in reality more than only two input and output ports.
  • a crossconnect matrix S in the network element is provided between the input ports to allow crossconnections from any input port to any output port under the control of a matrix controller CT 2 .
  • Such crossconnections are semi-permanent through-connections for individual multiplexing units that repeat periodically in the received multiplex signal. Crossconnections thus appear as transparent connections on path level.
  • Ports I 1 and O 1 are controlled by I/O controller CT 1 and I 2 and O 2 are controlled by I/O controller CT 3 .
  • Controllers CT 1 -CT 3 form the second level controller of the network element.
  • a first level controller is not shown in the figure since according to the invention, restoration paths are through-connected without interaction of the first level controller and the superordinate management plane.
  • a monitor M 1 is provided at the input I 1 , which monitors received traffic streams.
  • the monitor checks the path tags of traffic streams in the received transmission signal, which is a multiplex signal. If a received path tag corresponds to the configured path tag, then everything is all right. If the monitor M 1 detects a mismatch between a received tag and configured tag, then it raises a corresponding alarm towards the I/O controller CT 1 and reports the received tag. This is particularly the case when a new traffic stream is received at the input port I 1 , for example due to a restoration action of the preceding network element. The I/O controller CT 1 checks then a forwarding table stored in an memory of the controller to determine to which output port the newly received traffic stream shall be crossconnected and instructs the matrix controller M 2 accordingly.
  • a pattern generator G 1 is provided at the output port O 1 , which serves to generate an idle signal referred to as supervisory unequipped signal in currently unused time slots that represent the spare transmission capacity.
  • a similar pattern generator G 2 is also foreseen at output port O 2 .
  • NE 1 corresponds to NE 5 in FIG. 1 and that input I 1 is connected to NE 1 and output O 2 is connected to NE 6 .
  • working path WP 1 has failed.
  • NE 1 will recognize the interrupted transfer over working path WP 1 and, according to the invention, will thus check its forwarding information (i.e., the forwarding table) to see whether there is a pre-calculated restoration path available for the failed traffic stream. According to its information, a restoration path via NE 5 could be established.
  • NE 1 thus crossconnects the traffic stream from the failed working path WP 1 to the spare resource PP 1 , which was previously unused.
  • NE 5 will not know that working path WP 1 has failed but only receives at its input I 1 a new traffic stream with a new path tag. It thus raises a mismatch alarm towards its I/O controller CT 1 and reports the received path tag.
  • I/O controller CT 1 will now check its forwarding table provided for this purpose to determine to which output port the newly received traffic stream shall be crossconnected. In the embodiment, this would be output port O 2 . Thus, CT 1 instructs the matrix controller to crossconnect the input port I 1 to the output port O 2 . Matrix controller CT 2 then configures the crossconnect matrix S accordingly and informs the I/O controller CT 3 of the new crossconnection. Controller CT 3 re-configure the output port O 2 to remove the supervisory unequipped mode SUG and let the traffic stream pass.
  • the redirected traffic stream would thus already reach network element NE 6 , for which now the same procedure will apply. This continues until the redirected traffic stream reaches the destination network element NE 2 and the protection path is thus established.
  • the involved network elements notify the network management plane of the restoration action, i.e., that and which restoration path has been established.
  • the management plane determines new pre-calculated restoration paths from the remaining available backup resources and configures the network elements with new forwarding tables that contain the new restoration paths.
  • transmission signals are multiplex signals and carry more than one tributary signals.
  • the transmission signals are structured according to the SDH.
  • STM-N synchronous transport modules
  • Each STM- 4 frame for example contains four higher order multiplex units VC- 4 , which in turn can contain either three lower order multiplex units VC- 3 , 21 lower order multiplex units VC- 2 or 63 lower order multiplex units VC- 12 , each, or any suitable combinations thereof.
  • Each multiplex unit represents a path through the network.
  • the multiplex units carry the actual tributary signals and are repeated within each successive frame in exactly the same order. This is called the structure of the multiplex signal which is normally only changed by the management plane to establish new paths or change or delete existing paths. Idle multiplex positions within the payload section of a frame are filled with dummy multiplex units carrying the so-called supervisory unequipped signal.
  • each receive interface In order to be able to properly process the received transmission signal and in order to check consistency of the bit stream received, each receive interface has to know exactly the structure of the multiplex signal, i.e., which and how many multiplex units are multiplexed into each frame. Though, when new paths are created and the structure of the multiplex signal is thus changed, the receive end interface has to be reconfigured to accept the new multiplex structure. If the received multiplex structure does not match with the configured multiplex structure, the receive interface raises a mismatch alarm, which normally means that there is something wrong in the network, e.g., because a human operator has accidentally mixed up some cables.
  • a protection path is automatically established without prior reconfiguration of the receive side and the alarm thus provoked is used to trigger a table look-up to determine the destination of the multiplex units representing the new protection path.
  • this requires to identify the multiplex units, for which we see several alternatives that will be described in the following.
  • Each multiplex unit has a path overhead that accompanies the tributary signal from ingress to egress of the transport network.
  • This path overhead has a one byte field (referred to as JO for lines, J 1 for higher order virtual containers and J 2 for lower order virtual containers) for an identifier known as the Trail Trace Identifier (TTI).
  • TTI Trail Trace Identifier
  • the TTI is an identifier that can be freely assigned by the operator for the purpose to check locally whether the received multiplex unit corresponds to the expected one, i.e., whether the receive interface is properly connected with the right far-end transmit interface and all multiplex units appear in exactly the multiplex position within the received frames they should. This serves to prevent manual misconnections due to human configuration mistakes.
  • TTI serves to identify an entire path, it should not be changed along this path. Therefore, in order to use the TTI as path tag for the purpose of the invention, a unique and unambiguous assignment of TTIs within the entire network is necessary.
  • a TTI is 16 bytes long and is thus transmitted in 16 successive frames. Since the frames repeat every 125 ⁇ s, transmission of the entire TTI requires 2 ms. The first byte of the TTI contain a CRC 7 checksum and of the subsequent bytes the most significant bit is reserved for frame alignment. Thus, 105 bits remain to identify a path signal.
  • We propose the following assignment of the remaining 105 TTI bits (which differs to some extend from the already defined structure according to ITU-T G.7714.1, which at present does not allow for non-printable symbols): Each network node is assigned a unique address of 32 bits.
  • the first 32 bits of the TTI define the destination address; 32 bits define the source address; 16 bits define a path id unique for the source address; 8 bits define a setup priority of that circuit used for preemption at setup time; and 8 bits define a restoration priority of that circuit used for preemption at restoration time.
  • the input interface detects an unexpected multiplex unit in a received frame, it reports the received TTI to the second level controller.
  • the second level controller looks up in his forwarding table whether a pre-calculated restoration path exists for this TTI and if so, to which output port and time slot the multiplex units is to be crossconnected. If there is a pre-calculated restoration path defined for the received TTI, the forwarding table will point to an idle (i.e., unequipped) timeslot of an appropriate output port. Then, the second level controller configures the crossconnect matrix accordingly and instructs the output port to remove the supervisory unequipped signal from the corresponding timeslot and insert the through-connected multiplex unit instead.
  • a failed path i.e., WP 1 in FIG. 1
  • WP 1 is detected by an adjacent network element, i.e., NE 1 .
  • NE 1 now checks its forwarding table to find an alternative output interface and timeslot and switches a crossconnection (or a bridge) to this output and timeslot.
  • NE 1 would bridge the traffic stream affected by the failure from WP 1 to the reserved capacity PP 1 a.
  • NE 5 would detect the unexpected traffic stream and crossconnect it to the shared restoration capacity SPP.
  • NE 6 would equally detect the unexpected traffic stream and crossconnect it to restoration capacity PP 1 c towards NE 2 .
  • NE 2 in turn.
  • a restoration path for WP 1 is automatically established along PP 1 a, SPP, and PP 1 c.
  • Restoration time can even be shortened, if we take into account that a path through the network is typically bidirectional. Until know, only one direction has been considered. However, if the same procedure is applied in the reverse direction, the successive setup of the restoration path would start from both sides of a failed path and would thus meet somewhere in the middle of the restoration path. Therefore, the restoration time can be shortened by a factor of two.
  • TC-TTI Tandem Connection Monitoring
  • TCM function can preferably be used to detect and communicate failure locations along a working path. Moreover, a tandem connection is created under the sole responsibility of a single operator. He is solely responsible for the use of the TC-TTI and can choose whatever address assignment he wants. This avoids compatibility problems and conflicts in the assignment of TTls.
  • TC-TTI is transmitted in a 76 multiframe, i.e., an entire TTI is transmitted every 76 frames a 125 ⁇ s
  • reception of one TTI requires 9,5 ms.
  • Two or three consequent TC-TTI frames would thus require about 20 or 30 ms, respectively, for detection, i.e., until the TTI can be considered to be stable.
  • one byte is reserved for an automatic protection switching (APS) protocol on path level.
  • This byte is referred to a K 3 , an in particular bits 1 to 4 thereof, at higher order VC level and K 4 , and in particular bits 3 and 4 thereof, at lower order VC level.
  • APS signaling for protection switching on path level has never gained much acceptance and is currently not used in the field. Therefore and because protection mechanisms on path level would become obsolete with the use of the present invention, we propose to re-use the existing K 3 or K 4 byte positions for a local identifier.
  • the reserved bits 5 and 6 of K 3 or bits 5 to 7 of K 4 could be used instead.
  • the third embodiment uses an identifier which has local meaning, only.
  • the identifier which we will call in this case a label, is unique only for a certain physical link and corresponding interface and will be changed on each link along the path.
  • each interface has its own forwarding table.
  • the table contains for received labels corresponding output ports and timeslots where the multiplex unit is to be crossconnected and a new label with which the existing label is to be replaced. This new label is the one required by the subsequent network element.
  • MPLS label switching
  • the label can also use some selected bits (e.g., bits 3 and 4 of K 4 ) of few successive frames thus building a “K 4 multiframe” and would still meet any time requirements for restoration.
  • a pre-calculated restoration path is established in the case of a failure occurring somewhere along a working path, it is necessary to detect the failure situation.
  • the path terminating network elements will immediately receive an AIS (alarm indication signal), which expresses that the path has failed.
  • AIS alarm indication signal
  • the path is terminated within the transport network but can also be terminated at interfacing telecommunications equipment outside the transport network, for example at an IP router using the transport network for a backbone connection.
  • failure detection may preferably be achieved using Tandem Connection Monitoring (TCM) as described for example in ITU-T G.707.
  • TCM Tandem Connection Monitoring
  • a Tandem Connection can be established along an arbitrary segment of a path under the sole control of one network operator. This would allow to detect any failure condition that might occur along this monitored segment and initiate restoration starting from the termination points of the Tandem Connection, rather than from the termination points of the entire path.
  • TCM Tandem Connection Monitoring
  • the use of TCM would also make sure that unidirectional failures are reported in reverse direction so as to enable restoration actions by a preceding network element.
  • a failure adjacent network element detects the failure and activates a temporary tandem connection source function.
  • This function creates a valid tandem connection signal replacing the failed signal and inserts therein a failed link identifier corresponding to the failed link.
  • a Tandem Connection is created along the restoration path so as to enable failure monitoring on the restoration path and allows backward transmission of a reverse defect indication in the case a connection attempt fails.
  • the restoration based on path tags and local forwarding information uses pre-calculated backup paths. However, it might occur that the local forwarding information is no longer up to date and the backup capacity already busy or that the backup capacity is for other reasons not available. In this case, the local restoration action will fail. This failure to establish the pre-configured restoration path will be reported as RDI (Reverse Defect Indication) in the Tandem Connection created on the restoration path. Moreover, the traffic stream from the failed restoration path will be routed in reverse direction back to the preceding network element, which will detect the tag and therefore know that connection setup of the restoration path has failed. (The latter measure works even without a TC created along the restoration path.)
  • RDI Reverse Defect Indication
  • FIG. 4 shows schematically the connection setup according to the invention.
  • a network element NEn is connected at the left side (upstream direction) to a network element NEn ⁇ 1 and at the right side (downstream direction) to a network element NEn+1.
  • Network element NEn corresponds to NE in FIG. 3.
  • FIG. 4 a - 4 c Three scenarios are depicted in the below FIG. 4 a - 4 c.
  • FIG. 4 a symbolizes the successful connection setup
  • FIG. 4 b shows that connection setup fails due to a contention in the switching matrix S
  • FIG. 4 c shows backward report in the case that connection setup fails at network element NEn+1.
  • NEn ⁇ 1 detects a failure of a working path and initiates setup of a restoration path. Therefore, it transmits at its output interface a new multiplex unit with a new path tag (TTI, TC-TTI, or K 3 /K 4 ) to network element NEn.
  • TTI new path tag
  • TC-TTI new path tag
  • K 3 /K 4 new path tag
  • Monitor M 1 detects in step a 2 the new path tag and reports this to its I/O controller CT 1 .
  • CT 1 looks up in a forwarding table FT the output port that corresponds to the destination address specified in the new path tag and informs the crossconnect matrix controller CT 2 of the crossconnection to be switched.
  • step a 4 the matrix controller CT 2 configures the crossconnect matrix S accordingly and the new multiplex unit is crossconnect to output port O 2 .
  • the output port O 2 is configured via I/O controller CT 3 to insert the new path label for the subsequent network element NEn+1.
  • output O 2 is configured in step a 5 to transmit the new multiplex unit and pattern generator G 2 is deactivated so that the supervisory unequipped signal (SUG) is no longer inserted into the timeslot corresponding to the spare capacity.
  • the new multiplex unit with the new path tag reaches network element NEn+1, where the same procedure will apply.
  • steps b 1 -b 3 are the same as steps a 1 -a 3 in FIG. 4 a, but now the crossconnection at matrix S fails because the spare capacity at the output O 2 is already used and the requested matrix connection thus blocked. Therefore matrix controller CT 2 reconfigures the matrix S to loop the multiplexing unit back to output O 1 in step b 4 .
  • I/O controller CT 1 is informed about the failed connection setup and reconfigures the interface accordingly.
  • pattern generator GI is deactivated so that the SUG signal is no longer transmitted in the corresponding spare timeslot at O 1 and a reverse defect indication (RDI) is inserted into the associated path overhead.
  • RDI reverse defect indication
  • FIG. 4 c shows a scenario where connection setup fails at network element NEn+1. Steps c 1 -c 7 correspond to steps a 1 -a 7 in FIG. 4 a. In step c 8 , the crossconnection attempt in NEn+1 fails and the traffic signal is thus returned as in step b 4 -b 6 in FIG. 4 b. The multiplex units of the returned traffic signal are thus received in step c 9 at input port 12 which detects in step c 10 the TCM alarm (RDI) and the returned path tag and reports this to its I/O controller CT 3 .
  • RDI TCM alarm
  • step c 11 the pattern generator G 2 at output O 2 is activated again to send SUG in the corresponding restoration timeslot that was used in step c 7 before for the new traffic signal.
  • step c 12 the matrix controller is informed to configure a crossconnection to the output port O 1 and in step c 13 , the multiplex units are crossconnected through matrix S to O 1 .
  • step c 14 I/O controller CT 1 is informed of the failed connection setup and checks its forwarding table for an alternate restoration path.
  • step c 15 controller CT 1 has determined a secondary restoration path to be used instead of the failed one and starts in step c 16 a new restoration action continuing after step a 3 or c 3 .
  • Alternative failure reporting mechanisms include beside the looping back method described above the insertion of an RDI indicating that the link cannot be used or in the case of K 3 /K 4 tap type, insertion of a corresponding reserved failure type.
  • connection set-up based on path tags and local forwarding information can for example rather than for restoration purpose also be used for other purposes such as for distributed connection set-up without evolving the network management plane.

Abstract

Transmission signals in a transport network are multiplexed from traffic streams respectively representing paths. Each path is identified with a path tag and forwarding information is provided in each network element. Failed paths in the network are restored in that the source network element crossconnects the affected traffic stream to an alternate output port and subsequent network elements receiving this unexpected traffic stream at an input port check the received path tag, determine an appropriate output port based on the tag and the forwarding information, and establish an internal cross-connection between the input port and corresponding output port.

Description

  • The invention is based on a priority application EP 03290787.5 which is hereby incorporated by reference.[0001]
  • FIELD OF THE INVENTION
  • The present invention relates to the field of telecommunications and more particularly to a path restoration method in a transport network and a network element with fast restoration capabilities. [0002]
  • BACKGROUND OF THE INVENTION
  • Transport networks serve for the physical layer transport of high bitrate tributary signals. In particular, the signals transmitted over a transport network are encoded and multiplexed into a continuous bit stream structured into frames of the same length. Within this constant bitrate bit stream, the frames are repeated periodically with a frame repetition rate of typically 8 kHz and are structured according to a multiplexing hierarchy. An example of such a multiplexing hierarchy is SDH (Synchronous Digital Hierarchy, see ITU-T G.707 10/2000) where the frames are termed synchronous transport modules of size N (STM-N, where N=1, 4, 16, 64, or 256). The frames have a section overhead and contain at least one higher order multiplexing unit called virtual container VC-[0003] 4. A VC-4 can either directly carry a tributary signal or a number of lower order multiplexing units like VC-12 or VC-3, which then carry tributary signals.
  • Virtual containers are transmitted from source to sink through an SDH network and therefore represent a “logical” path through the network. The sequence of identical VCs having the some relative position in subsequent frames forms a traffic stream along that path. Each VC contains a path overhead (POH) and a payload section referred to as container (C). The US equivalent of SDH is known as SONET (Synchronous Optical Network). Another well known transport network with similar multiplexing units is the recently defined Optical Transport Network OTN; see ITU-T G.709, 02/2001. [0004]
  • A very basic aspect in all types of transport networks is availability and reliability of service. In other words, a transport network must be very robust against any kind of failure and the average outage time must be very low. Hence, a transport network needs to provide the means and facilities to ensure sufficient availability. Typically, network mechanisms which ensure this availability are distinguished in protection and restoration. The common principle of both is to redirect traffic of a failed physical link or logical path over a spare resource. [0005]
  • Protection is a mechanisms where an already established protection path or link is assigned to one selected high-priority path or link (known as 1+1 or 1:1 protection, depending on whether there is low priority extra traffic on the protection resource or not) or a group of n such selected paths or links (known as 1:n protection). In the case of a failure, traffic can be re-routed very fast over the previously established protection resource under the sole control of the affected network elements in typically less than 50 ms. However; this requires a protocol between the affected nodes to signal and synchronize switch-over. Protection is a high-quality service restricted to few selected premium connections, which are typically charged at a higher price. Moreover, protection requires a high amount of spare resources compared with the amount of protected resources, i.e., 100% of spare capacity in the case of 1+1 protection. [0006]
  • Restoration refers to a mechanism, where the network searches for restoration capacity and establishes a restoration path only after service path failure. Rather than calculating the restoration path after failure, pre-calculated restoration routes can be used instead but with the actual cross-connection to establish the path performed after failure. Restoration mechanisms are more stringent in the usage of spare capacity and however, providing a masking of the failure at a lower speed, typically in the range of a few seconds as completely new paths through the network must be established. [0007]
  • In label switched packet networks, as opposed to transport networks, alternative label switched paths (LSPs) can already be implemented and then used in the case of a failure. The fundamental difference between transport networks and packet networks, where MPLS applies (Multi-Protocol Label Switching), is that in packet networks statistical multiplexing is used allowing over-subscription of links and that an LSP can be established without using any bandwidth. However, in transport networks, if a path is established, then by definition the full bandwidth requested by the path is consumed, independent of whether traffic is transmitted over this path or not. An LSP can be established before failure in MPLS, but not used until after failure, whereas this is not possible in transport networks. [0008]
  • The IETF proposal “RSVP-TE Extension for Shared-Mesh Restoration in Transport Networks” by G. Li et al, draft-li-shared-mesh-restoration-01.txt, addresses this issue and proposes an GMPLS extension where backup paths are pre-established in the management plane of the network but only activated after detection of a failure. This requires signaling messages to be exchanged in the management plane, which in a GMPLS controlled network is distributed across the entire network. This interaction of a decentralized network management is, however, a relatively slow process, which leads to restoration times in the range of at least some hundred milliseconds. [0009]
  • SUMMARY OF THE INVENTION
  • It is an object of the present invention, to provide an improved restoration technique which allows faster restoration in a transport network than known restoration methods but offers more flexibility and requires less spare resources than known protection methods. [0010]
  • These and other objects that appear below are achieved by a method according to [0011] claim 1 and a network element according to claim 6.
  • In particular, the method according to the invention involves that each path is identified at least locally with an identifier called herein a path tag which is part of the multiplex units that represent the corresponding path and forwarding information is provided in each network element. In the case of a path failure, the source network element cross-connects the affected traffic stream to an alternate output port. When a network element receives a new traffic stream at an input port, it checks the received path tag and determines an appropriate output port based on the tag and the forwarding information and establishes an internal cross-connection between the input port and corresponding output port. The forwarding information is provided by the management plane of the transport network and represents pre-calculated restoration paths. [0012]
  • The established restoration path consumes spare resources in the network, which are therefore no longer available for restoration purpose in the case of further failures. Therefore, in an advantageous improvement, the management plane is informed of the established restoration path after activation of the restoration path in the event of a failure, and determines new forwarding information to allow masking of potential further failures in the network over newly pre-calculated restoration paths. [0013]
  • The invention has the advantage that the average restoration time in the network can be reduced to about 50 ms or even less, depending on the repetition rate of the tag and the number of involved network elements along the restoration path.[0014]
  • BRIEF DESCRIPTION OF DRAWINGS
  • Preferred embodiments of the present invention will now be described with reference to the accompanying drawings in which [0015]
  • FIG. 1 shows an example network topology; [0016]
  • FIG. 2 shows the control and management of a network element; [0017]
  • FIG. 3 shows the restoration principle at a network element in a first embodiment; and [0018]
  • FIG. 4 shows how the path is established through a network element and what when path setup fails.[0019]
  • DETAILED DESCRIPTION OF THE INVENTION
  • In this specification, we use the term transmission signal for a multiplex signal subdivided into frames of the same length. The frames are structured according to a multiplex hierarchy into multiplex units such as virtual containers VC in SDH. A certain multiplex unit represents a path through the network and repeats every frame. The sequence of identical multiplex units that are transmitted along the same path form a traffic stream which transports a tributary signal. Several traffic streams are thus multiplexed according to the multiplex hierarchy to form the transmission signal. [0020]
  • An example network topology is shown in FIG. 1. A first working path WP[0021] 1 exists between network elements NE1 and NE2 and a second working path WP2 exists between network elements NE3 and NE4. Broken lines PP1 a, PP1 c, PP2 a, PP2 c, and SPP indicate reserved restoration capacity allowing network restoration in the case of a failure of either of the working paths. If for example path WP1 fails, a restoration path (also termed backup path) is created via network elements NE5 and NE6 using restoration capacity PP1 a, SPP, and PP1 c. Conversely, if path WP2 fails, a restoration path is created using restoration capacity PP2 a, SPP, and PP2 c. It is important to understand, that these restoration paths, even if they may be pre-calculated, are only established after occurrence of a failure. In other words, the network elements NE5 and NE6 switch a corresponding internal crossconnection to establish the restoration path only after a failure has occurred. This allows to share a single entity of restoration capacity SPP between NE5 and NE6 for both working paths WP1 and WP2.
  • The hardware design and control of a network element is shown schematically in FIG. 2. The network element itself consists of a number of hardware modules, such as input/output boards I/O and crossconnect matrix boards X shown in the embodiment by way of example. Interconnections and signal flow of transmission signals are not shown in the figure. The individual boards are controlled and configured by a low level hardware controller, which is called second level controller SLC. The second level controller can be distributed among the boards, can consist of some few shelf controllers, or can also be a single controller if the network element is installed in only one shelf. It contains the hardware oriented control software which is termed firmware. The second level controller is controlled by a higher level controller called the first level controller FLC. This first level controller contains for the purpose of network management an abstraction of the network element and its resources in the form of a management information base (MIB). The MIB contains managed objects respectively representing the physical and logical resources of the entire network element and their configuration. A virtual hardware module and a firmware adaptor interface the MIB in the first level controller towards the firmware in the second level controller. [0022]
  • The first level controller FLC is controlled by a network management or management plane TMN, which may be a central network management system for the entire network. The interface between the central network management system and the network elements is known as the Q-interface for which a standardized protocol exists. Alternatively, the management plane may be a distributed network management system where each network element is controlled by an individual element controller and where these element controllers communicate with each other using the recently defined GMPLS protocol to find a route through the network and establish network paths. Communication within the management plane and towards the network elements uses a dedicated packet switched control network apart from the transport network. However, some interconnections in this dedicated control network may use the so-called data communication channels in the section overhead of transmission signals in the transport network. [0023]
  • The management plane TMN is responsible to properly configure the entire network. If for example a new connection is to be established in the network, the management plane instructs the first level controllers of the affected network elements to switch the new connection. The first level controllers reconfigure their abstract view of the corresponding network elements accordingly and update their persistent configuration data. Then the request is forwarded to the second level controller, which determines the actual hardware modules involved and reconfigures these to establish the connection as requested. [0024]
  • In reverse direction, the second level controller monitors the hardware modules for any alarm and failure conditions and reports these to the first level controller. The first level controller maps alarm and failure reports on the abstraction and reports any irregularities to the management plane. [0025]
  • In known restoration mechanisms, the management plane needs to localize a failure by correlating received alarm reports and requests the affected network elements to switch new crossconnections to establish a dynamically calculated or pre-calculated restoration path. However, from the above explained, it would be evident, that this process requires extended time-consuming communication and processing, which sums up to a considerably high restoration time. [0026]
  • It is therefore a basic idea of the present invention to provide information about pre-calculated restoration paths at the lowest level, i.e., in the second level controller SLC or even with the hardware as such and to trigger switching of the local crossconnections necessary to establish a restoration path in the event of a failure with locally available information, only. [0027]
  • If no protocol communication between network elements and towards the management plane is necessary, restoration times can be shortened considerably. However, the affected network elements would not naturally know about a failure that happened somewhere else in the network. For example in FIG. 1, after a failure of working path WP[0028] 1, network elements NE5 and NE6, which do not see the failed path at all, would have to initiate appropriate crossconnections to establish a protection path over PP1 a, SPP, and PP1 c.
  • Therefore, another basic idea is to mark traffic on path level with an identifier, which has unambiguous meaning at least locally and to monitor the interfaces of a network element for new traffic streams. If a new traffic stream is detected at an interface, this traffic stream will then automatically be crossconnected to the appropriate output port as defined by the locally available forwarding information provided in the form of a forwarding table. [0029]
  • FIG. 3 shows a network element NE with a first input port I[0030] 1 and first output port O1 and a second input port I2 and a second output port O2. It has to be noted that these two input and output ports are shown only be way of example but that the network element has in reality more than only two input and output ports. A crossconnect matrix S in the network element is provided between the input ports to allow crossconnections from any input port to any output port under the control of a matrix controller CT2. Such crossconnections are semi-permanent through-connections for individual multiplexing units that repeat periodically in the received multiplex signal. Crossconnections thus appear as transparent connections on path level.
  • Ports I[0031] 1 and O1 are controlled by I/O controller CT1 and I2 and O2 are controlled by I/O controller CT3. Controllers CT1-CT3 form the second level controller of the network element. A first level controller is not shown in the figure since according to the invention, restoration paths are through-connected without interaction of the first level controller and the superordinate management plane.
  • A monitor M[0032] 1 is provided at the input I1, which monitors received traffic streams. In particular, the monitor checks the path tags of traffic streams in the received transmission signal, which is a multiplex signal. If a received path tag corresponds to the configured path tag, then everything is all right. If the monitor M1 detects a mismatch between a received tag and configured tag, then it raises a corresponding alarm towards the I/O controller CT1 and reports the received tag. This is particularly the case when a new traffic stream is received at the input port I1, for example due to a restoration action of the preceding network element. The I/O controller CT1 checks then a forwarding table stored in an memory of the controller to determine to which output port the newly received traffic stream shall be crossconnected and instructs the matrix controller M2 accordingly.
  • A pattern generator G[0033] 1 is provided at the output port O1, which serves to generate an idle signal referred to as supervisory unequipped signal in currently unused time slots that represent the spare transmission capacity. A similar pattern generator G2 is also foreseen at output port O2.
  • Assume known that the network element NE corresponds to NE[0034] 5 in FIG. 1 and that input I1 is connected to NE1 and output O2 is connected to NE6. Assume further that working path WP1 has failed. NE1 will recognize the interrupted transfer over working path WP1 and, according to the invention, will thus check its forwarding information (i.e., the forwarding table) to see whether there is a pre-calculated restoration path available for the failed traffic stream. According to its information, a restoration path via NE5 could be established. NE1 thus crossconnects the traffic stream from the failed working path WP1 to the spare resource PP1, which was previously unused. NE5 will not know that working path WP1 has failed but only receives at its input I1 a new traffic stream with a new path tag. It thus raises a mismatch alarm towards its I/O controller CT1 and reports the received path tag.
  • I/O controller CT[0035] 1 will now check its forwarding table provided for this purpose to determine to which output port the newly received traffic stream shall be crossconnected. In the embodiment, this would be output port O2. Thus, CT1 instructs the matrix controller to crossconnect the input port I1 to the output port O2. Matrix controller CT2 then configures the crossconnect matrix S accordingly and informs the I/O controller CT3 of the new crossconnection. Controller CT3 re-configure the output port O2 to remove the supervisory unequipped mode SUG and let the traffic stream pass.
  • In the example shown in FIG. 1, the redirected traffic stream would thus already reach network element NE[0036] 6, for which now the same procedure will apply. This continues until the redirected traffic stream reaches the destination network element NE2 and the protection path is thus established.
  • The involved network elements notify the network management plane of the restoration action, i.e., that and which restoration path has been established. In a preferred improvement of the invention, after the restoration path is established and some of the backup capacity thus used, the management plane determines new pre-calculated restoration paths from the remaining available backup resources and configures the network elements with new forwarding tables that contain the new restoration paths. [0037]
  • It should be noted that transmission signals are multiplex signals and carry more than one tributary signals. In the example chosen, the transmission signals are structured according to the SDH. This means, a transmission signal is a continuous bit stream subdivided into frames with a length of 125 μs, each. The frames are called synchronous transport modules STM-N (N=1, 4, 16, 64 or 256). Each STM-[0038] 4 frame for example contains four higher order multiplex units VC-4, which in turn can contain either three lower order multiplex units VC-3, 21 lower order multiplex units VC-2 or 63 lower order multiplex units VC-12, each, or any suitable combinations thereof. Each multiplex unit represents a path through the network. The multiplex units carry the actual tributary signals and are repeated within each successive frame in exactly the same order. This is called the structure of the multiplex signal which is normally only changed by the management plane to establish new paths or change or delete existing paths. Idle multiplex positions within the payload section of a frame are filled with dummy multiplex units carrying the so-called supervisory unequipped signal.
  • In order to be able to properly process the received transmission signal and in order to check consistency of the bit stream received, each receive interface has to know exactly the structure of the multiplex signal, i.e., which and how many multiplex units are multiplexed into each frame. Though, when new paths are created and the structure of the multiplex signal is thus changed, the receive end interface has to be reconfigured to accept the new multiplex structure. If the received multiplex structure does not match with the configured multiplex structure, the receive interface raises a mismatch alarm, which normally means that there is something wrong in the network, e.g., because a human operator has accidentally mixed up some cables. [0039]
  • According to the present invention, a protection path is automatically established without prior reconfiguration of the receive side and the alarm thus provoked is used to trigger a table look-up to determine the destination of the multiplex units representing the new protection path. As explained above, this requires to identify the multiplex units, for which we see several alternatives that will be described in the following. [0040]
  • Trail Trace Identifier [0041]
  • Each multiplex unit has a path overhead that accompanies the tributary signal from ingress to egress of the transport network. This path overhead has a one byte field (referred to as JO for lines, J[0042] 1 for higher order virtual containers and J2 for lower order virtual containers) for an identifier known as the Trail Trace Identifier (TTI). The TTI is an identifier that can be freely assigned by the operator for the purpose to check locally whether the received multiplex unit corresponds to the expected one, i.e., whether the receive interface is properly connected with the right far-end transmit interface and all multiplex units appear in exactly the multiplex position within the received frames they should. This serves to prevent manual misconnections due to human configuration mistakes.
  • As the TTI serves to identify an entire path, it should not be changed along this path. Therefore, in order to use the TTI as path tag for the purpose of the invention, a unique and unambiguous assignment of TTIs within the entire network is necessary. [0043]
  • A TTI is 16 bytes long and is thus transmitted in 16 successive frames. Since the frames repeat every 125 μs, transmission of the entire TTI requires 2 ms. The first byte of the TTI contain a CRC[0044] 7 checksum and of the subsequent bytes the most significant bit is reserved for frame alignment. Thus, 105 bits remain to identify a path signal. We propose the following assignment of the remaining 105 TTI bits (which differs to some extend from the already defined structure according to ITU-T G.7714.1, which at present does not allow for non-printable symbols): Each network node is assigned a unique address of 32 bits. The first 32 bits of the TTI define the destination address; 32 bits define the source address; 16 bits define a path id unique for the source address; 8 bits define a setup priority of that circuit used for preemption at setup time; and 8 bits define a restoration priority of that circuit used for preemption at restoration time.
  • If the input interface detects an unexpected multiplex unit in a received frame, it reports the received TTI to the second level controller. The second level controller looks up in his forwarding table whether a pre-calculated restoration path exists for this TTI and if so, to which output port and time slot the multiplex units is to be crossconnected. If there is a pre-calculated restoration path defined for the received TTI, the forwarding table will point to an idle (i.e., unequipped) timeslot of an appropriate output port. Then, the second level controller configures the crossconnect matrix accordingly and instructs the output port to remove the supervisory unequipped signal from the corresponding timeslot and insert the through-connected multiplex unit instead. [0045]
  • A failed path, i.e., WP[0046] 1 in FIG. 1, is detected by an adjacent network element, i.e., NE1. NE1 now checks its forwarding table to find an alternative output interface and timeslot and switches a crossconnection (or a bridge) to this output and timeslot. In the embodiment, NE1 would bridge the traffic stream affected by the failure from WP1 to the reserved capacity PP1 a. NE5 would detect the unexpected traffic stream and crossconnect it to the shared restoration capacity SPP. NE6 would equally detect the unexpected traffic stream and crossconnect it to restoration capacity PP1 c towards NE2. NE2 in turn. would detect the traffic stream that should normally arrive from WP1 at the input port terminating PP1 c and crossconnects the traffic stream to the appropriate destination. In other words, the destination node N2 merges the restoration path with the failed working path. By this mechanism, a restoration path for WP1 is automatically established along PP1 a, SPP, and PP1 c.
  • As explained above, a complete TTI is transmitted every 2 ms. In order to be sure that an unexpected TTI is not only an artifact due to bit errors, three consequent TTIs should be received before a network element initiates the crossconnection. This would require about 6 ms in total at one network element. For an average path leading over five network elements, the total restoration time lies thus in the rage of only 30 ms. [0047]
  • Restoration time can even be shortened, if we take into account that a path through the network is typically bidirectional. Until know, only one direction has been considered. However, if the same procedure is applied in the reverse direction, the successive setup of the restoration path would start from both sides of a failed path and would thus meet somewhere in the middle of the restoration path. Therefore, the restoration time can be shortened by a factor of two. [0048]
  • The first alternative using the path TTI as path tag would thus lead to a very short restoration time but would require a unique assignment of addresses throughout the entire network. As the TTI is today used under the sole responsibility of the operator, this would impose some organizational compatibility problems in heterogeneous multi-national or multi-operator networks. [0049]
  • Thus a second alternative could be preferred over the first: [0050]
  • Tandem Connection Trail Trace Identifier [0051]
  • In the path overhead, a one byte field is reserved for a Tandem Connection Monitoring (TCM) function. This byte is referred to as N[0052] 1 for higher order virtual containers and as N2 for lower order virtual containers. Bits 7 and 8 of this field contain in a 76 multiframe a tandem connection trail trace identifier (TC-TTI). This TC-TTI could be used for the path tag in a similar manner as described above for the path TTI, i.e., to transmit a 32 bit destination address, a 32 bit source address; 16 bits for a path id unique for the source address; 8 bits for a setup priority of that circuit used for preemption at setup time; and 8 bits for a restoration priority of that circuit used for preemption at restoration time.
  • The use of TCM function has several advantages. First of all, TCM function can preferably be used to detect and communicate failure locations along a working path. Moreover, a tandem connection is created under the sole responsibility of a single operator. He is solely responsible for the use of the TC-TTI and can choose whatever address assignment he wants. This avoids compatibility problems and conflicts in the assignment of TTls. [0053]
  • On the other hand, as the TC-TTI is transmitted in a 76 multiframe, i.e., an entire TTI is transmitted every 76 frames a 125 μs, reception of one TTI requires 9,5 ms. Two or three consequent TC-TTI frames would thus require about 20 or 30 ms, respectively, for detection, i.e., until the TTI can be considered to be stable. Even when restoration starts from both sides of a failed path, a restoration path along at most four network elements can be established within an average restoration time of 50 ms. [0054]
  • Therefore, a third alternative is preferred over the first two: [0055]
  • Use of the Reserved K[0056] 3 Byte
  • In the path overhead, one byte is reserved for an automatic protection switching (APS) protocol on path level. This byte is referred to a K[0057] 3, an in particular bits 1 to 4 thereof, at higher order VC level and K4, and in particular bits 3 and 4 thereof, at lower order VC level. However, APS signaling for protection switching on path level has never gained much acceptance and is currently not used in the field. Therefore and because protection mechanisms on path level would become obsolete with the use of the present invention, we propose to re-use the existing K3 or K4 byte positions for a local identifier. Alternatively, the reserved bits 5 and 6 of K3 or bits 5 to 7 of K4 could be used instead.
  • As these few bits would certainly not suffice for a worldwide or at least network wide unique and unambiguous address space, the third embodiment uses an identifier which has local meaning, only. In other words, the identifier, which we will call in this case a label, is unique only for a certain physical link and corresponding interface and will be changed on each link along the path. [0058]
  • In particular, each interface has its own forwarding table. The table contains for received labels corresponding output ports and timeslots where the multiplex unit is to be crossconnected and a new label with which the existing label is to be replaced. This new label is the one required by the subsequent network element. As those skilled in the art would appreciate, this is to some extent similar to the known label switching (MPLS) but not used for routing packets but for crossconnecting multiplex units between continuous bit stream multiplex signals. We can therefore term this process “label crossconnecting”. [0059]
  • This has the advantage that, since the K[0060] 3 or K4 byte is repeated once every frame, after reception of only three consequent frames the new label can be considered as stable and a corresponding crossconnection initiated, which would therefore take less than 1 μs per network element (i.e., per hop), only. The label can also use some selected bits (e.g., bits 3 and 4 of K4) of few successive frames thus building a “K4 multiframe” and would still meet any time requirements for restoration.
  • Failure Detection [0061]
  • As according to the invention, a pre-calculated restoration path is established in the case of a failure occurring somewhere along a working path, it is necessary to detect the failure situation. On path level, the path terminating network elements will immediately receive an AIS (alarm indication signal), which expresses that the path has failed. Thus, the terminating network elements can activate restoration. [0062]
  • However, it is not necessarily true that the path is terminated within the transport network but can also be terminated at interfacing telecommunications equipment outside the transport network, for example at an IP router using the transport network for a backbone connection. As mentioned earlier, failure detection may preferably be achieved using Tandem Connection Monitoring (TCM) as described for example in ITU-T G.707. A Tandem Connection can be established along an arbitrary segment of a path under the sole control of one network operator. This would allow to detect any failure condition that might occur along this monitored segment and initiate restoration starting from the termination points of the Tandem Connection, rather than from the termination points of the entire path. The use of TCM would also make sure that unidirectional failures are reported in reverse direction so as to enable restoration actions by a preceding network element. [0063]
  • In another advantageous improvement, use can be made of non-intrusive intermediate Tandem Connection monitors, and temporary Tandem Connection sources created along the path segment in the case of a failure in order to forward information about the actual fault location. [0064]
  • In particular, a failure adjacent network element detects the failure and activates a temporary tandem connection source function. This function creates a valid tandem connection signal replacing the failed signal and inserts therein a failed link identifier corresponding to the failed link. More details on fault localization using Tandem Connection Monitoring can be found in co-pending European Patent Application “Failure Localization in a Transmission Network”, filed 19 Nov. 2002 and being assigned the European filing number 02360317.8, which document is incorporated by reference herein. [0065]
  • This would allow that any network element along the failed path is informed about the actual failure location and restoration actions can be started not only from the terminal points of the Tandem Connection but already from any network element in-between the failure location and the terminal point. Thus, it would be possible to find in shorter time a shorter restoration path circumventing only the failure location but using most of the already existing and non-failed working path. As this would encompass the least amount of reconfiguration, this would again considerably reduce the time required for restoration and would also save spare resources as non-failed path segments would not have to be circumvented using spare resources. [0066]
  • Yet another alternative is to initiate restoration actions based on primary link alarms, i.e. loss of signal (LOS). This would however not cover all possible failures, but the most frequent failure sources which are for example a cable break or an optical fiber accidentally unplugged by a human operator. [0067]
  • Failed Connection Attempts [0068]
  • In a preferred improvement of the invention, a Tandem Connection is created along the restoration path so as to enable failure monitoring on the restoration path and allows backward transmission of a reverse defect indication in the case a connection attempt fails. [0069]
  • The restoration based on path tags and local forwarding information uses pre-calculated backup paths. However, it might occur that the local forwarding information is no longer up to date and the backup capacity already busy or that the backup capacity is for other reasons not available. In this case, the local restoration action will fail. This failure to establish the pre-configured restoration path will be reported as RDI (Reverse Defect Indication) in the Tandem Connection created on the restoration path. Moreover, the traffic stream from the failed restoration path will be routed in reverse direction back to the preceding network element, which will detect the tag and therefore know that connection setup of the restoration path has failed. (The latter measure works even without a TC created along the restoration path.) [0070]
  • FIG. 4 shows schematically the connection setup according to the invention. A network element NEn is connected at the left side (upstream direction) to a network element NEn−1 and at the right side (downstream direction) to a network [0071] element NEn+1. Network element NEn corresponds to NE in FIG. 3. Three scenarios are depicted in the below FIG. 4a-4 c. FIG. 4a symbolizes the successful connection setup; FIG. 4b shows that connection setup fails due to a contention in the switching matrix S; and FIG. 4c shows backward report in the case that connection setup fails at network element NEn+1.
  • In FIG. 4[0072] a, it is assumed that NEn−1 detect a failure of a working path and initiates setup of a restoration path. Therefore, it transmits at its output interface a new multiplex unit with a new path tag (TTI, TC-TTI, or K3/K4) to network element NEn. This is depicted as step al. Monitor M1 detects in step a2 the new path tag and reports this to its I/O controller CT1. Depicted as step a3, CT1 looks up in a forwarding table FT the output port that corresponds to the destination address specified in the new path tag and informs the crossconnect matrix controller CT2 of the crossconnection to be switched. In step a4, the matrix controller CT2 configures the crossconnect matrix S accordingly and the new multiplex unit is crossconnect to output port O2. In the case of label switching, the output port O2 is configured via I/O controller CT3 to insert the new path label for the subsequent network element NEn+1. Anyway, output O2 is configured in step a5 to transmit the new multiplex unit and pattern generator G2 is deactivated so that the supervisory unequipped signal (SUG) is no longer inserted into the timeslot corresponding to the spare capacity. Thus, the new multiplex unit with the new path tag reaches network element NEn+1, where the same procedure will apply.
  • In FIG. 4[0073] b, steps b1-b3 are the same as steps a1-a3 in FIG. 4a, but now the crossconnection at matrix S fails because the spare capacity at the output O2 is already used and the requested matrix connection thus blocked. Therefore matrix controller CT2 reconfigures the matrix S to loop the multiplexing unit back to output O1 in step b4. In step b5, I/O controller CT1 is informed about the failed connection setup and reconfigures the interface accordingly. Thus, in step b6, pattern generator GI is deactivated so that the SUG signal is no longer transmitted in the corresponding spare timeslot at O1 and a reverse defect indication (RDI) is inserted into the associated path overhead. The new multiplex units with RDI inserted thus returns in step b7 to the previous network element NEn−1, which is will now know about the failed restoration attempt.
  • FIG. 4[0074] c shows a scenario where connection setup fails at network element NEn+1. Steps c1-c7 correspond to steps a1-a7 in FIG. 4a. In step c8, the crossconnection attempt in NEn+1 fails and the traffic signal is thus returned as in step b4-b6 in FIG. 4b. The multiplex units of the returned traffic signal are thus received in step c9 at input port 12 which detects in step c10 the TCM alarm (RDI) and the returned path tag and reports this to its I/O controller CT3. In step c11, the pattern generator G2 at output O2 is activated again to send SUG in the corresponding restoration timeslot that was used in step c7 before for the new traffic signal. In step c12, the matrix controller is informed to configure a crossconnection to the output port O1 and in step c13, the multiplex units are crossconnected through matrix S to O1. In step c14, I/O controller CT1 is informed of the failed connection setup and checks its forwarding table for an alternate restoration path. In step c15, controller CT1 has determined a secondary restoration path to be used instead of the failed one and starts in step c16 a new restoration action continuing after step a3 or c3.
  • Alternative failure reporting mechanisms include beside the looping back method described above the insertion of an RDI indicating that the link cannot be used or in the case of K[0075] 3/K4 tap type, insertion of a corresponding reserved failure type.
  • Although having described several preferred embodiments of the invention, those skilled in the art would appreciate that various changes, alterations, and substitutions can be made without departing from the spirit and concepts of the present invention. [0076]
  • The inventive concept for a connection set-up based on path tags and local forwarding information can for example rather than for restoration purpose also be used for other purposes such as for distributed connection set-up without evolving the network management plane. This would lead to a connection setup that is to some extend similar to classical label switching or IP routing in packet networks. This would additionally require some sort of loop prevention mechanism, which could for example be achieved by properly defining the forwarding information and avoiding to overwrite a crossconnection for a bit-stream the same path tag. [0077]

Claims (10)

What is claimed is
1. A method of establishing a path through a transport network, said network comprising a number of physically interconnected network elements (NEn−1, NEn, NEn−1); transmission signals being transported over physical connections between said network elements; each transmission signal being subdivided into frames of the same length, said frames being structured according to a multiplex hierarchy into multiplex units respectively representing paths through said network and repeating every frame thereby forming traffic streams multiplexed to form said transmission signals; said method comprising the steps of
assigning each traffic stream an identifier called hereinafter a path tag which is sent in said traffic stream on a regular basis;
providing forwarding information (FT) in each network element along said path to be established;
receiving (a1) a new traffic stream at an input port (I1) of a network element (NEn);
checking (a2) the path tag of the received traffic stream and determining (a3) an appropriate output port (O2) based on said path tag and the forwarding information (FT); and
establishing (a4) an internal cross-connection between said input port (I1) and said previously determined output port (O2).
2. A method for establishing a restoration path according to claim 1, comprising the steps of
detecting a failure of an already existing path at a first network element (NE1);
at said first network element, crossconnecting the traffic stream affected by said failure to an alternate output port;
at an input port of a second network element (NE5), connected to the alternate output port of the first network element (NE1), receiving said traffic stream;
checking the path tag of the received traffic stream and determining an appropriate output port based on said path tag and the forwarding information of said second network element;
establishing an internal cross-connection between said input port and said previously determined output port; and
repeating said steps at preceding network elements along said restoration path.
3. A method according to claim 1, wherein said path tag is a trail trace identifier unambiguously assigned in said transport network.
4. A method according to claim 3, wherein said trail trace identifier is either a path trail trace identifier or a Tandem Connection trail trace identifier.
5. A method according to claim 1, wherein said path tag is label which is inserted by the preceding network element and which label will be replaced by the actual network element with a new label for the subsequent network element.
6. A network element (NEn) of a transport network; said network element comprising
at least one input port (I1) designed for the reception of a transmission signal subdivided into frames of the same length, said frames being structured according to a multiplex hierarchy into multiplex units respectively representing paths through said network and repeating every frame thereby forming traffic streams multiplexed to form said transmission signals; wherein each traffic stream having an identifier assigned, which is called hereinafter a path tag and which is sent in said traffic stream on a regular basis;
a low-level controller (CT1, CT2, CT3; SLC) controlling said input port (I1) and comprising a memory for storing forwarding information (FT) provided to said network element;
a monitor (M1) assigned to said input port (I1) for checking the path tags of all traffic streams received at said input port and for determining whether any of said received path tags does not correspond to expected path tags and if so, for notifying the unexpected path tag to said low-level controller (CT1); and
a crossconnect matrix (S) for crossconnecting any of said traffic streams from said input port (I1) to any of a number of output ports (O2) under the control of said low-level controller (CT2); wherein said low-level controller (CT1, CT2, CT3) is adapted to determine an appropriate output port (O2) for a traffic stream with an unexpected path tag based on said path tag and said forwarding information (FT) and to configure said crossconnect matrix (S) to establish an internal cross-connection between said input port (I1) and said previously determined output port (O2).
7. A network element according to claim 6, further comprising a high-level controller (FLC) connected to said low level-controller (SLC), said high level controller comprising an abstraction of physical and logical resources of said network element for the purpose of network management and an interface to a network management facility (TMN); whereby said low-level controller (SLC) is adapted to determining an appropriate output port for a traffic stream with an unexpected path tag without involving said high-level controller (FLC).
8. A network element according to claim 6, wherein said low-level controller (SLC) is distributed among more than one shelves or on-board controllers in said network element.
9. A network management facility for controlling and configuring network elements of a transport network wherein transmission signals are transported over physical connections between said network elements; each transmission signal being subdivided into frames of the same length, said frames being structured according to a multiplex hierarchy into multiplex units respectively representing paths through said network and repeating every frame thereby forming traffic streams multiplexed to form said transmission signals; wherein each traffic stream is assigned an identifier called hereinafter a path tag; said network management facility being adapted and programmed to determine pre-calculated restoration paths for working paths being established in said network and to provide to said network elements forwarding information based on said path tags to allow said network elements to determine an appropriate output port for a traffic stream with an unexpected path tag received at an input port by using said path tag and said forwarding information and to establish an internal cross-connection between said input port and said previously determined output port.
10. A network management facility according to claim 9, being further adapted and programmed
to determine new restoration paths from remaining spare capacity in said network after receipt of a notification from a network element saying that a restoration path has been established and
to provide new forwarding information to said network elements.
US10/787,358 2003-03-28 2004-02-27 Transport network restoration method Active 2028-06-18 US7590131B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP03290787A EP1463370B1 (en) 2003-03-28 2003-03-28 Transport network restoration method
EP03290787.5 2003-03-28

Publications (2)

Publication Number Publication Date
US20040190446A1 true US20040190446A1 (en) 2004-09-30
US7590131B2 US7590131B2 (en) 2009-09-15

Family

ID=32799154

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/787,358 Active 2028-06-18 US7590131B2 (en) 2003-03-28 2004-02-27 Transport network restoration method

Country Status (4)

Country Link
US (1) US7590131B2 (en)
EP (1) EP1463370B1 (en)
AT (1) ATE388597T1 (en)
DE (1) DE60319502T2 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040213149A1 (en) * 2003-04-22 2004-10-28 Alcatel Method for using the complete resource capacity of a synchronous digital hierarchy network, subject to a protection mechanism, in the presence of data (packet) network, and relating apparatus for the implementation of the method
US20050286413A1 (en) * 2004-06-28 2005-12-29 Wakumoto Shaun K Handling link failures with re-tagging
US20060045007A1 (en) * 2004-09-01 2006-03-02 Alcatel Method of setting up a backup path in a transport network
US20060182082A1 (en) * 2005-02-11 2006-08-17 Wakumoto Shaun K Switching mesh with user-configurable paths
US20060250948A1 (en) * 2005-05-09 2006-11-09 Cisco Technology, Inc. Dynamic path protection in an optical network
US20080239958A1 (en) * 2007-03-28 2008-10-02 Christopher Warren Murray Routing path calculation apparatus and methods
US20080281987A1 (en) * 2007-05-10 2008-11-13 Nortel Networks Limited Facilitating automatic protection switching for provider backbone network
US7603588B1 (en) 2004-04-20 2009-10-13 Cisco Technology, Inc. Two-stage detection of trace identifier mismatches
US20100232782A1 (en) * 2009-03-10 2010-09-16 Fujitsu Limited Optical transmission device, optical transmission system including the same, and optical transmission method
US7870246B1 (en) * 2005-08-30 2011-01-11 Mcafee, Inc. System, method, and computer program product for platform-independent port discovery
US20120063325A1 (en) * 2009-05-29 2012-03-15 Telefonaktiebolaget Lm Ericsson (Publ) Failure localisation in a mpls-tp network
US20130114594A1 (en) * 2005-01-26 2013-05-09 Blitz Stream Video, Llc Layered Multicast and Fair Bandwidth Allocation and Packet Prioritization
US20140119172A1 (en) * 2012-10-26 2014-05-01 Futurewei Technologies, Inc. Apparatus and Method to Find Partially Disjoint Routes for Dual Fiber-Cuts
US20160156413A1 (en) * 2012-11-23 2016-06-02 Zte Corporation Method for Processing Optical Signal, Optical Signal Sending Node and Optical Node
CN113179458A (en) * 2021-04-26 2021-07-27 中国电信集团工会上海市委员会 Signal routing management system with end-to-end protection
CN113472662A (en) * 2021-07-09 2021-10-01 武汉绿色网络信息服务有限责任公司 Path redistribution method and network service system
CN114390085A (en) * 2022-03-24 2022-04-22 长沙荣业智能制造有限公司 Grain processing industry internet structure and edge controller thereof

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL159979A (en) * 2004-01-21 2009-08-03 Eci Telecom Ltd Fast rerouting of traffic in a circuit switched mesh network
DE602004001231T2 (en) 2004-07-02 2007-04-19 Alcatel Method for restoring supplementary traffic supporting transport networks
JP4500154B2 (en) * 2004-11-08 2010-07-14 富士通株式会社 Frame transmission apparatus and frame reception apparatus
CN1780253A (en) * 2004-11-17 2006-05-31 华为技术有限公司 Method for repeating route rapidly
US7602777B2 (en) 2004-12-17 2009-10-13 Michael Ho Cascaded connection matrices in a distributed cross-connection system
US20060143544A1 (en) * 2004-12-17 2006-06-29 Michael Ho Remote status forwarding in a distributed cross-connection system
CN101945307B (en) 2009-07-03 2013-04-24 华为技术有限公司 Distribution treatment method of labels in optical network, optical communication device and optical communication system
EP2296300B1 (en) * 2009-09-14 2012-05-02 Alcatel Lucent Method and apparatus for automatic discovery in optical transport networks
EP2784956B1 (en) * 2013-03-26 2020-12-23 Fujitsu Limited Asymmetric OTN network traffic support

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6215763B1 (en) * 1997-10-29 2001-04-10 Lucent Technologies Inc. Multi-phase process for distributed precomputation of network signal paths
US6331978B1 (en) * 1999-03-09 2001-12-18 Nokia Telecommunications, Oy Generic label encapsulation protocol for carrying label switched packets over serial links
US20020172150A1 (en) * 2001-05-17 2002-11-21 Shinya Kano Transmission unit and failure recovery method
US20020176370A1 (en) * 1997-08-08 2002-11-28 Kabushiki Kaisha Toshiba Scheme for label switched path loop detection at node device
US20040022279A1 (en) * 2002-08-05 2004-02-05 Alcatel M:N path protection
US20040105383A1 (en) * 2000-03-03 2004-06-03 Niraj Agrawal Network auto-provisioning and distributed restoration
US7167443B1 (en) * 1999-09-10 2007-01-23 Alcatel System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7426179B1 (en) * 2000-03-17 2008-09-16 Lucent Technologies Inc. Method and apparatus for signaling path restoration information in a mesh network

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020176370A1 (en) * 1997-08-08 2002-11-28 Kabushiki Kaisha Toshiba Scheme for label switched path loop detection at node device
US6215763B1 (en) * 1997-10-29 2001-04-10 Lucent Technologies Inc. Multi-phase process for distributed precomputation of network signal paths
US6331978B1 (en) * 1999-03-09 2001-12-18 Nokia Telecommunications, Oy Generic label encapsulation protocol for carrying label switched packets over serial links
US7167443B1 (en) * 1999-09-10 2007-01-23 Alcatel System and method for packet level restoration of IP traffic using overhead signaling in a fiber optic ring network
US20040105383A1 (en) * 2000-03-03 2004-06-03 Niraj Agrawal Network auto-provisioning and distributed restoration
US20020172150A1 (en) * 2001-05-17 2002-11-21 Shinya Kano Transmission unit and failure recovery method
US20040022279A1 (en) * 2002-08-05 2004-02-05 Alcatel M:N path protection

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7370107B2 (en) * 2003-04-22 2008-05-06 Alcatel Method for using the complete resource capacity of a synchronous digital hierarchy network, subject to a protection mechanism, in the presence of data (packet) network, and relating apparatus for the implementation of the method
US20040213149A1 (en) * 2003-04-22 2004-10-28 Alcatel Method for using the complete resource capacity of a synchronous digital hierarchy network, subject to a protection mechanism, in the presence of data (packet) network, and relating apparatus for the implementation of the method
US7603588B1 (en) 2004-04-20 2009-10-13 Cisco Technology, Inc. Two-stage detection of trace identifier mismatches
US20050286413A1 (en) * 2004-06-28 2005-12-29 Wakumoto Shaun K Handling link failures with re-tagging
US7656790B2 (en) * 2004-06-28 2010-02-02 Hewlett-Packard Development Company, L.P. Handling link failures with re-tagging
US20060045007A1 (en) * 2004-09-01 2006-03-02 Alcatel Method of setting up a backup path in a transport network
US7529183B2 (en) 2004-09-01 2009-05-05 Alcatel Method of setting up a backup path in a transport network
US20130114594A1 (en) * 2005-01-26 2013-05-09 Blitz Stream Video, Llc Layered Multicast and Fair Bandwidth Allocation and Packet Prioritization
US9414094B2 (en) * 2005-01-26 2016-08-09 Blitz Stream Video, Llc Layered multicast and fair bandwidth allocation and packet prioritization
US9497109B2 (en) * 2005-02-11 2016-11-15 Hewlett Packard Enterprise Development Lp Switching mesh with user-configurable paths
US20060182082A1 (en) * 2005-02-11 2006-08-17 Wakumoto Shaun K Switching mesh with user-configurable paths
US20060250948A1 (en) * 2005-05-09 2006-11-09 Cisco Technology, Inc. Dynamic path protection in an optical network
US7835267B2 (en) * 2005-05-09 2010-11-16 Cisco Technology, Inc. Dynamic path protection in an optical network
US7870246B1 (en) * 2005-08-30 2011-01-11 Mcafee, Inc. System, method, and computer program product for platform-independent port discovery
US20080239958A1 (en) * 2007-03-28 2008-10-02 Christopher Warren Murray Routing path calculation apparatus and methods
US9031085B2 (en) * 2007-03-28 2015-05-12 Alcatel Lucent Routing path calculation apparatus and methods
US20080281987A1 (en) * 2007-05-10 2008-11-13 Nortel Networks Limited Facilitating automatic protection switching for provider backbone network
US20100232782A1 (en) * 2009-03-10 2010-09-16 Fujitsu Limited Optical transmission device, optical transmission system including the same, and optical transmission method
US8412038B2 (en) * 2009-03-10 2013-04-02 Fujitsu Limited Optical transmission device, optical transmission system including the same, and optical transmission method
US20140140217A1 (en) * 2009-05-29 2014-05-22 Telefonaktiebolaget L M Ericsson (Publ) Methods and Arrangements in an MPLS-TP Network
US9059905B2 (en) * 2009-05-29 2015-06-16 Telefonaktiebolaget L M Ericsson (Publ) Methods and arrangements in an MPLS-TP network
US8611353B2 (en) * 2009-05-29 2013-12-17 Telefonaktiebolaget L M Ericsson (Publ) Failure localisation in a MPLS-TP network
US20120063325A1 (en) * 2009-05-29 2012-03-15 Telefonaktiebolaget Lm Ericsson (Publ) Failure localisation in a mpls-tp network
US20140119172A1 (en) * 2012-10-26 2014-05-01 Futurewei Technologies, Inc. Apparatus and Method to Find Partially Disjoint Routes for Dual Fiber-Cuts
US9007892B2 (en) * 2012-10-26 2015-04-14 Futurewei Technologies, Inc. Apparatus and method to find partially disjoint routes for dual fiber-cuts
US20160156413A1 (en) * 2012-11-23 2016-06-02 Zte Corporation Method for Processing Optical Signal, Optical Signal Sending Node and Optical Node
US9979487B2 (en) * 2012-11-23 2018-05-22 Zte Corporation Method for processing optical signal, optical signal sending node and optical node
CN113179458A (en) * 2021-04-26 2021-07-27 中国电信集团工会上海市委员会 Signal routing management system with end-to-end protection
CN113472662A (en) * 2021-07-09 2021-10-01 武汉绿色网络信息服务有限责任公司 Path redistribution method and network service system
CN114390085A (en) * 2022-03-24 2022-04-22 长沙荣业智能制造有限公司 Grain processing industry internet structure and edge controller thereof

Also Published As

Publication number Publication date
EP1463370B1 (en) 2008-03-05
ATE388597T1 (en) 2008-03-15
US7590131B2 (en) 2009-09-15
DE60319502T2 (en) 2008-06-26
DE60319502D1 (en) 2008-04-17
EP1463370A1 (en) 2004-09-29

Similar Documents

Publication Publication Date Title
US7590131B2 (en) Transport network restoration method
US7529183B2 (en) Method of setting up a backup path in a transport network
US7688717B2 (en) Transport network restoration method supporting extra traffic
EP1735950B1 (en) Line-level path protection in the optical layer
US8089864B2 (en) Network restoration
KR100462408B1 (en) A Fast Re-route Method Using GMPLS in Optical Transport Networks
US8559812B2 (en) Methods and systems for the hierarchical mesh restoration of connections in an automatically switched optical network
US6658013B1 (en) Method and apparatus for ensuring survivability of inter-ring traffic
EP1391068B1 (en) Restoration protection in communication networks
US20030214962A1 (en) Method and apparatus for bandwidth optimization in network ring topology
US9253067B2 (en) OAM in OTN networks: GMPLS signaling for TCM
JP5506931B2 (en) Method and apparatus for automatic discovery in an optical transport network
EP1280374A1 (en) Network element with redundant switching matrix
US9832107B2 (en) Misconnection avoidance on networks
US20040221058A1 (en) Nested protection switching in a mesh connected communications network
EP1422888A2 (en) Constraint based routing with irregular metrics
US20040252635A1 (en) Restoration in an automatically switched optical transport network
US6898177B1 (en) ATM protection switching method and apparatus
WO2011017863A1 (en) Protection control method and apparatus for shared ring of optical data unit
US7706268B2 (en) Transmission device
US20030063561A1 (en) Equivalent switching method for transmission devices in mpls networks
Imamovic et al. Practical benchmark analysis of traffic protection with Ethernet-over-SDH transmission

Legal Events

Date Code Title Description
AS Assignment

Owner name: ALCATEL, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ANSORGE, STEFAN;HUCK, MARTIN;BELLER, DIETER;REEL/FRAME:015033/0379

Effective date: 20031006

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
AS Assignment

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:LUCENT, ALCATEL;REEL/FRAME:029821/0001

Effective date: 20130130

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:ALCATEL LUCENT;REEL/FRAME:029821/0001

Effective date: 20130130

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: ALCATEL LUCENT, FRANCE

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG;REEL/FRAME:033868/0001

Effective date: 20140819

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NOKIA TECHNOLOGIES OY;NOKIA SOLUTIONS AND NETWORKS BV;ALCATEL LUCENT SAS;REEL/FRAME:043877/0001

Effective date: 20170912

Owner name: NOKIA USA INC., CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP LLC;REEL/FRAME:043879/0001

Effective date: 20170913

Owner name: CORTLAND CAPITAL MARKET SERVICES, LLC, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNORS:PROVENANCE ASSET GROUP HOLDINGS, LLC;PROVENANCE ASSET GROUP, LLC;REEL/FRAME:043967/0001

Effective date: 20170913

AS Assignment

Owner name: ALCATEL LUCENT, FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:ALCATEL;REEL/FRAME:048329/0784

Effective date: 20061130

Owner name: NOKIA US HOLDINGS INC., NEW JERSEY

Free format text: ASSIGNMENT AND ASSUMPTION AGREEMENT;ASSIGNOR:NOKIA USA INC.;REEL/FRAME:048370/0682

Effective date: 20181220

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12

AS Assignment

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104

Effective date: 20211101

Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CORTLAND CAPITAL MARKETS SERVICES LLC;REEL/FRAME:058983/0104

Effective date: 20211101

Owner name: PROVENANCE ASSET GROUP LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723

Effective date: 20211129

Owner name: PROVENANCE ASSET GROUP HOLDINGS LLC, CONNECTICUT

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:NOKIA US HOLDINGS INC.;REEL/FRAME:058363/0723

Effective date: 20211129

AS Assignment

Owner name: RPX CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PROVENANCE ASSET GROUP LLC;REEL/FRAME:059352/0001

Effective date: 20211129

AS Assignment

Owner name: BARINGS FINANCE LLC, AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:RPX CORPORATION;REEL/FRAME:063429/0001

Effective date: 20220107